Qwiet AI (@qwietai) 's Twitter Profile
Qwiet AI

@qwietai

The AI powered AppSec platform that your developers will love

ID: 1614021647585144832

linkhttp://www.qwiet.ai calendar_today13-01-2023 22:10:29

114 Tweet

399 Takipçi

29 Takip Edilen

Qwiet AI (@qwietai) 's Twitter Profile Photo

Ben Denkers has an intriguing theory on a possible long game for the #MOVEit attack. . . (This is an excerpt from episode 2 of our #podcast, "#Hacking Exposed: Qwiet Edition." Catch the full episode here, along with notes, resources, and the transcript: bit.ly/43WAqjf )

Qwiet AI (@qwietai) 's Twitter Profile Photo

#Containers enable #developers to work faster, but they can also create security #risks. The right approach can let you secure your work without slowing down, allowing you to ship on time. Our latest blog post shows you how to do just that: bit.ly/3OCRcQi

#Containers enable #developers to work faster, but they can also create security #risks.

The right approach can let you secure your work without slowing down, allowing you to ship on time.

Our latest blog post shows you how to do just that: bit.ly/3OCRcQi
Qwiet AI (@qwietai) 's Twitter Profile Photo

We recently found a way to save an enterprise nearly 10k hours of #developer time w/our revolutionary #SAST platform: - we cut false positives by 95% vs their old tool - we scanned 6x faster Read the details: bit.ly/3DHZb8s Scan now for free: bit.ly/44KE3Kx

We recently found a way to save an enterprise nearly 10k hours of #developer time w/our revolutionary #SAST platform:

- we cut false positives by 95% vs their old tool

- we scanned 6x faster

Read the details: bit.ly/3DHZb8s

Scan now for free: bit.ly/44KE3Kx
Qwiet AI (@qwietai) 's Twitter Profile Photo

Over 80 critical #Linux vulnerabilities were ID'ed this year. Our latest blog gives you a full run-down, with best practices for modeling threats and securing your code--all without sacrificing speed or #innovation: bit.ly/3s9ncT5

Over 80 critical #Linux vulnerabilities were ID'ed this year.

Our latest blog gives you a full run-down, with best practices for modeling threats and securing your code--all without sacrificing speed or #innovation:

bit.ly/3s9ncT5
Qwiet AI (@qwietai) 's Twitter Profile Photo

You know what's even better than Black Hat? Black Hat with fun people, that's what. Come check us out at booth #2834 and see what we mean :) #blackhat2023 #AppSec #developers

You know what's even better than Black Hat?

Black Hat with fun people, that's what.

Come check us out at booth #2834 and see what we mean :)

#blackhat2023 
#AppSec 
#developers
Qwiet AI (@qwietai) 's Twitter Profile Photo

At #BlackHat2023? Come see us at booth #2834 for: - cutting-edge AppSec - smoothies - sparkling banter - swag - chair massages - memorable software demos - raffles - an invite to our reception at the Barbershop in the Cosmo (last-minute RSVP here: bit.ly/3OwrGe2 )

At #BlackHat2023?

Come see us at booth #2834 for:

- cutting-edge AppSec
- smoothies
- sparkling banter
- swag
- chair massages
- memorable software demos
- raffles
- an invite to our reception at the Barbershop in the Cosmo (last-minute RSVP here: bit.ly/3OwrGe2 )
Qwiet AI (@qwietai) 's Twitter Profile Photo

Remote code execution (RCE) vulnerabilities can enable attackers to completely take over a system. It's crucial to review your code and business logic thoroughly before launch. Let us walk you through some of the essential considerations: bit.ly/3qrXGrP #developers

Remote code execution (RCE) vulnerabilities can enable attackers to completely take over a system.

It's crucial to review your code and business logic thoroughly before launch.

Let us walk you through some of the essential considerations: bit.ly/3qrXGrP

#developers
Qwiet AI (@qwietai) 's Twitter Profile Photo

Episode 3 of "#Hacking Exposed: Qwiet Edition" is here--this time with mood lighting and jackets, on location at #BlackHat2023. Stuart McClure, Chris, and Ben Denkers are back, joined by Arun Balakrishnan. Click here to listen: qwiet.co/Hacking-Expose… #podcasting

Episode 3 of "#Hacking Exposed: Qwiet Edition" is here--this time with mood lighting and jackets, on location at #BlackHat2023.

<a href="/stuartmcclure/">Stuart McClure</a>, <a href="/chrismadhatter/">Chris</a>, and Ben Denkers are back, joined by Arun Balakrishnan.

Click here to listen:
qwiet.co/Hacking-Expose…

#podcasting
Qwiet AI (@qwietai) 's Twitter Profile Photo

#CISA recently released new guidance to prevent web application control abuse stemming from insecure direct object reference (IDOR) #vulnerabilities. Read our summary to learn how to lock down your code and stop #IDOR vulnerabilities in their tracks: qwiet.co/CISA--tldr

#CISA recently released new guidance to prevent web application control abuse stemming from insecure direct object reference (IDOR) #vulnerabilities.

Read our summary to learn how to lock down your code and stop #IDOR vulnerabilities in their tracks: qwiet.co/CISA--tldr
Qwiet AI (@qwietai) 's Twitter Profile Photo

Open Redirection #Attacks can expose a victim to a range of #risks, including getting phished or downloading #malware. And for companies, they can cause significant reputational and financial damage. See our run-down here: qwiet.co/ORA-info

Open Redirection #Attacks can expose a victim to a range of #risks, including getting phished or downloading #malware. And for companies, they can cause significant reputational and financial damage.

See our run-down here: qwiet.co/ORA-info
Qwiet AI (@qwietai) 's Twitter Profile Photo

Staying on top of new n-day vulnerabilities is an endless struggle. #CVSS can be misleading in the context of remediation: a vulnerability ID'ed as "critical" may not actually be reachable. We give actionable advice for triaging #vulnerabilities here: qwiet.co/n-day-vulns

Staying on top of new n-day vulnerabilities is an endless struggle.

#CVSS can be misleading in the context of remediation: a vulnerability ID'ed as "critical" may not actually be reachable.

We give actionable advice for triaging #vulnerabilities here: qwiet.co/n-day-vulns
Qwiet AI (@qwietai) 's Twitter Profile Photo

Sean Kalinich of Bits, Bytes, and Bourbon sat down with our own Stuart McClure to talk about what makes Qwiet AI unique in the field of #AppSec. One quote among many: "Qwiet AI as it stands is a force multiplier." Read more here: qwiet.co/Decrypted-Tech

Qwiet AI (@qwietai) 's Twitter Profile Photo

Our latest article explains mixed content, the security risks it poses, and key ways to address the problem. Read now to learn how to find mixed content in your code so you can safeguard web security. Your users are counting on you! qwiet.co/Decoding-Mixed… #webdeveloper

Our latest article explains mixed content, the security risks it poses, and key ways to address the problem.

Read now to learn how to find mixed content in your code so you can safeguard web security. Your users are counting on you!

qwiet.co/Decoding-Mixed…

#webdeveloper
Qwiet AI (@qwietai) 's Twitter Profile Photo

Attackers are using malicious npm packages as vectors to execute second-stage malware on a victim's machine. Recent attacks follow a general pattern, usually involving social engineering. Click here now to learn more: qwiet.co/npm-packages #npm #socialengineering #developers

Attackers are using malicious npm packages as vectors to execute second-stage malware on a victim's machine.

Recent attacks follow a general pattern, usually involving social engineering.

Click here now to learn more:
qwiet.co/npm-packages

#npm
#socialengineering
#developers
Qwiet AI (@qwietai) 's Twitter Profile Photo

Our article on troubleshooting SSL/TLS issues covers everything you'll probably ever need to know on the topic: - common issues - tools and tactics - a step-by-step process for debugging - how to avoid common mistakes Here you go: qwiet.co/SSL-TLS-guide

Our article on troubleshooting SSL/TLS issues covers everything you'll probably ever need to know on the topic:
- common issues
- tools and tactics
- a step-by-step process for debugging
- how to avoid common mistakes

Here you go: qwiet.co/SSL-TLS-guide
Qwiet AI (@qwietai) 's Twitter Profile Photo

Have you ever wondered why attackers spend so much time and energy exploiting #vulnerabilities in video games, as opposed to other types of software? We get into some of the reasons in this clip. Click here for the full ep, plus transcript and notes: qwiet.co/why-hack-a-game

Qwiet AI (@qwietai) 's Twitter Profile Photo

Our breakdown of hashing and encryption will help you navigate the challenges of securing user data, especially passwords. We give you specific tools and best practices to consider, along with some nifty diagrams. Click here for the guide: qwiet.co/Hashing-vs-Enc… #developers

Our breakdown of hashing and encryption will help you navigate the challenges of securing user data, especially passwords.

We give you specific tools and best practices to consider, along with some nifty diagrams.

Click here for the guide:
qwiet.co/Hashing-vs-Enc…

#developers
Qwiet AI (@qwietai) 's Twitter Profile Photo

Like the web #tech that gives rise to them, DOM-based #XSS vectors are always evolving. Our article on these attacks starts with an intro to the basics, then works up to advanced considerations for securing your assets. Click here now for the deep dive: qwiet.co/DOM-XSS

Like the web #tech that gives rise to them, DOM-based #XSS vectors are always evolving.

Our article on these attacks starts with an intro to the basics, then works up to advanced considerations for securing your assets.

Click here now for the deep dive:
qwiet.co/DOM-XSS
Qwiet AI (@qwietai) 's Twitter Profile Photo

Click here now to read our analysis of the recent #cyberattack perpetrated by Carderbee, a previously unidentified #threat actor: qwiet.co/Carderbee-atta… This kind of sophisticated #SupplyChain attack shows the importance of always reviewing code before pushing it live.

Click here now to read our analysis of the recent #cyberattack perpetrated by Carderbee, a previously unidentified #threat actor:
qwiet.co/Carderbee-atta…

This kind of sophisticated #SupplyChain attack shows the importance of always reviewing code before pushing it live.